Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

In this session, we'll identify the 10 most common layers in a typical container deployment, and the best ways to build security into each layer. These layers include: 1) container host: Multi-tenancy at the container layer, 2) content security container registries, and secure access to container images, 3) build process controlling what can be deployed with a cluster container platform authentication and authorization, 4) networking isolation, 5) attached storage API management, 6) endpoint security, 7) SSO roles, 8) access management in a cluster federation. Increasingly complicated applications and demands for faster development are putting even more pressure on infrastructure, IT teams, and processes. It's more important than ever to have the right technologies in place. Containers deliver applications faster and scale them more rapidly.

Daniel Oh is principal technical product marketing manager at Red Hat and works CNCF ambassador as well. He's well recognized in cloud-native app dev, senior DevOps practices in many open source projects and international conferences.